Using Palo Alto Networks Next Generation Firewalls

advertisement
Using Palo Alto Networks
Next Generation Firewalls to
Increase Visibility into Threats
and Reduce Threat Risks
SPONSORED BY
WhatWorks is a user-to-user program in which security managers who
have implemented effective Internet security technologies tell why they
deployed it, how it works, how it improves security, what problems they
faced and what lessons they learned. Got a story of your own?
A product you’d like to know about? Let us know.
www.sans.org/whatworks
A B O U T N o r t h w e s t Sa v i n g s B an k
Northwest Bancshares, Inc. (NASDAQ: NWBI) is the holding company of Northwest Savings
Bank. Founded in 1896, Northwest Savings Bank is a full-service financial institution offering
a complete line of personal and business banking products including employee benefits,
investment management services, insurance and trust. Northwest operates 165 community
banking offices in Pennsylvania, New York, Ohio and Maryland and 50 consumer finance offices
in Pennsylvania through its subsidiary, Northwest Consumer Discount Company.
A bout t h e U s e r
Lance Spencer is the Lead Data Security Engineer at Northwest Savings Bank and is
responsible for maintaining the confidentiality, integrity, and availability of information within
the organization. He has 20 plus years of experience as an IT professional with 10 of those
concentrated in information security. He holds a degree in computer science, is certified by
ISC2 as a CISSP, and by GIAC as a GCFA (GIAC Certified Forensic Analyst)
Su m m a r y
Northwest Savings Bank was at the refresh point for its perimeter security and content
filtering solutions. Given the threat environment and the demands of auditors in the highly
regulated financial vertical, Northwest wanted to get increased visibility into threats and
network traffic without increasing procurement cost or staffing requirements. The Palo Alto
Networks Next Generation Firewall met all those needs and identified threats that other
security solutions had not detected.
SANS WhatWorks
Using Palo Alto Networks Next Generation Firewalls to Increase Visibility into Threats and Reduce Threat Risks
QTell us a little bit about yourself and the role you play in
Northwest.
A
I’m a Lead Data Security Engineer at Northwest. We’re a
smaller sized security team being a community bank. The data
security group consists of myself, as lead security engineer. We
have a CISO who reports to the CIO, and then we also have
a couple of security analysts that work within our group – a
pretty small group, but we cover anything that’s data security
related for the corporation.
QIs everything pretty much
under data security,
whether it is network
security, endpoints, data,
systems – it’s all under
there?
place to see what’s going on with our traffic. In some areas
Palo Alto Networks is complementing our existing controls.
We still follow the mindset of defense in depth and layered
security. So, while we didn’t go out and just rip and replace
everything, while some services we did replace; others, Palo
Alto Networks is working in conjunction with.
QSince it was a little bit of both, did you need get
additional budget then? Did you have to go to
management and justify additional budget, or was it just
part of a yearly refresh kind of thing?
A The cost offsets weren’t
necessarily in areas where we
did replace equipment, such
and kind of tied everything into one package.
as pulling out our existing
technology and putting Palo
Alto Networks in. From a
A Yes. It all falls under our data security group.
cost standpoint, that was almost a wash. Typically, we were
getting to the point where we had to renew some equipment
QSince you’re using the Palo Alto Networks products,
anyway, and it just made sense to put Palo Alto Networks in
what sort of problems, or what reasons did you start out
as a replacement. But, then we saw the other feature sets that
looking for something like what you’re now using from
we could enable and where we could collapse other services.
Palo Alto Networks?
A good example is our content filter licensing agreement. We
A A big part of it was, being a smaller group, we need to have
were using a third party for providing web content filtering.
as much visibility into our network and security controls as
The contract was coming up about the same time we were
possible. We’re also heavily audited and heavily regulated in the
looking to say, “Hey, is it time to move off our existing platform
financial industry. So, we really needed to gain visibility not just
for an application layer firewall?” So, we looked at that contract
into network traffic, but what was contained within that traffic.
and said, “Well, the Palo Alto Networks could basically act as
We also had a number of challenges with content filtering. So,
the firewall, and it can do content filtering.” We were able to
Palo Alto Networks was really appealing to us from day one. It
eliminate the content filter service altogether. So, in the grand
unifies so many of the security controls that we were looking
scheme of things, there were significant cost savings. I hate to
at as niche players here and there to solve a certain task. Palo
throw out cliché terms, but it was almost a no-brainer to move
Alto Networks really gave us that extra visibility and kind of
to Palo Alto Networks.
tied everything into one
package.
QDid you start out by
looking at a bunch of
I hate to throw out cliché terms, but it was almost a
QSo, was this a scenario
competitive products,
no-brainer to move to Palo Alto Networks.
where you had a number
or did you just start
of products – maybe
out looking at Palo Alto
firewalls and some other
Networks?
products – and you wanted the additional visibility and
A We were looking at upgrading our existing technology
you said sort of “roll them all together” and reduce the
solutions with our same vendor, with the same platform. Our
number of products you had, so that you were replacing
management team had some prior experience with Palo Alto
some things with Palo Alto Networks?
Networks and more or less said, “Before we jump right back
A
Palo Alto Networks really gave us that extra visibility
In some sense, yes, we did rip and replace some controls
when we put Palo Alto Networks in. In other areas, it’s
complementary to existing controls. A big part was tying a lot
of those controls together so we more or less had “one pane
of glass” to manage those functions. While inspecting traffic
content, we’re only seeing that through a management tool
that’s network based while our content filtering is a whole
separate component. This really brought it all together so we
could aggregate a lot of the security data and focus in one
SANS WhatWorks
in and sign an agreement and keep going down this road, let’s
take a look at what Palo Alto Networks has to offer.” And
after a very short time of looking at Palo Alto Networks in
comparison, it was night and day. It was time for a platform
change, and we’d get a lot of value for our buck. So, that’s how
the migration path went. We didn’t go through the traditional
stack up three vendors and have a bake off. It was comparing
Palo Alto Networks to our existing platform and seeing if we
still wanted to go forward with our existing platform.
Using Palo Alto Networks Next Generation Firewalls to Increase Visibility into Threats and Reduce Threat Risks
QYou mention additional visibility and some of the other
features, like the web content filtering and the like. Were
there any other criteria you were looking at to compare
the two that were important to you in this area?
A
Yes. We are experiencing a growing demand to be able
to perform SSL inspection. Again, we’re regulated and we
have to keep a close eye on what data is transmitted. We
started looking at a separate niche solution for doing SSL
decryption. That’s rolled in as one of the feature sets of Palo
Alto Networks, and was very appealing to us. It’s one of the
features that we turned on almost day one out of the box.
QHow about intrusion prevention?
Are you using them
as firewall and intrusion detection/prevention, or do you
have a separate layer for that?
off this technology that we’ve been operating for years and
our network and security team are comfortable with. We had
accumulated years of network rules and NAT tables that we
implemented and rely on. We formed an internal team between
data security and networking to come up with a strategy.
The very first thing we did, which is a benefit of Palo Alto
Networks technologies, is we put the Palo Alto Networks in
line on a V-wire (virtual wire) configuration. So, we placed Palo
Alto Networks “in front” of our existing firewall, and we just let
the traffic patch through so, we could see the behavior, see how
it reacted, how it responded, see what it was seeing above and
beyond what our typical port and protocol firewall could do.
We ran in that configuration for maybe three to four months. I
think it was a full business quarter that we ran in that mode of
just observing and seeing its capabilities/learning the tool.
We sent our security and network engineers out to get
training on the Palo Alto Networks platform. And then, when
our “go-live”, it was relatively easy to migrate the rules – to
export the rules out and migrate them into our Palo Alto
Networks and move out of a V-wire mode. We were paranoid
so we actually found a third party – a partner of Palo Alto
Networks – that specializes in
migrations. We flew a guy in
... for a small shop where we need to get services up and he sat right next to us in
the datacenter and we waited
QGive me an idea of
and running quickly, it really is a lifesaver.
for anything and everything to
the scope. How many
go wrong. After two hours into
firewalls, or how many
our
change
control
window
when
we “flipped the switch” and
appliances are you talking about?
rewired our cabinets, the Palo Alto Network firewalls came
A We’re currently using two Palo Alto Networks firewalls for our
online. I think we had to adjust maybe two or three firewall
primary data center. That’s our main ingress/egress. Everything
rules. By Monday morning, it was seamless – no notable
that’s Internet based within our corporation traverses those
business interruption. We prepared for the possibility of a large
Palo Alto Networks firewalls. And then, we have a second set
disaster, and it was a non-event.
that’s in an HA pair that we have in our backup data center. So,
we have a total of four units. Again, they’re acting as Internet
QYou had three months or so of running them in parallel
ingress/egress points. We’re now looking at bringing the Palo
- essentially, it then took you less than a week to make
Alto Networks technology inside to do manage zoning of
the actual switchover once you decided to go.
different network segments.
A Yes that’s an accurate statement. The biggest migration change
that we had to adapt to was when we went from just your
QOne of the fears rational people usually have from
standard protocol rule set over to Palo Alto Networks, which,
changing firewall platforms is converting the old firewall
obviously, is application based. The rules migrated as they were.
policies into what’s going to run on the new platform.
So, if we say “To this destination, port 80 is open…” we went
How did you find that? Did you use any tools? How did
back and did clean up afterward, and instead of specifying port
you go about doing that?
80 to that destination we changed that to an application level
A Good question – that was one of our greatest concerns when
rule which moved the focus from an IP port to application
we were looking to go to a whole new platform. I think in most
web-browsing. That was something that took about two hours
of our initial meetings, we knew what technology we wanted.
of going through those rules and identifying the applications to
It was pretty obvious to us. The big challenge was just that –
adjust accordingly.
coming up with a strategy of how we were going to migrate
A
It’s used in combination. So, it’s complimentary to our existing
IDS/IPS solutions. But, I’m finding my team leveraging the data
that we’re seeing out of our Palo Alto Networks more than
out of our existing IDS/IPS solutions. I think a lot of that’s
attributed to the usability of the data that’s presented out of
the Palo Alto Networks. I think it’s a little bit friendlier for our
analysts to understand the
data that they’re seeing.
SANS WhatWorks
Using Palo Alto Networks Next Generation Firewalls to Increase Visibility into Threats and Reduce Threat Risks
QHave you added any application level rules since you got
the baseline going? SAP, Oracle, or any other?
A
Absolutely – we’ve added numerous rules with new business
services. The ease of doing it is night and day from where we
were at. I don’t know how familiar you are with the Microsoft
Lync environment. It’s very firewall rule intensive. There are
pre-defined applications built inherently into the Palo Alto
Networks. So, one could say “Allow outbound Lync access,”
or, “Allow inbound Lync.” It dynamically knows which ports it’s
going to use and needs to open to make that application work.
So, in a sense, it kind of dumbs down some of the deep tech
work that you need to do to manage a firewall, but for a small
shop where we need to get services up and running quickly, it
really is a lifesaver.
QWere you using your older firewalls and now the Palo
Alto Networks for remote access VPN from external
laptop employees?
A
We haven’t migrated VPN services off of our existing VPN
solution to the Palo Alto Networks. We’re not using the global
connect type features on the Palo Alto Networks. We have
tested them. We’re evaluating whether or not we want to
put all those eggs in one basket at this time. So, that’s pretty
much where we’re at at this point. We’re also using the Palo
Alto Networks units as a web content filter – day one we
didn’t migrate off our web content filter. It was 90 days after
we migrated over to our Palo Alto Networks firewall. We
migrated the current rule set and performed rule clean up
from our existing web content filter and started having the
Palo Alto Networks, play the role of being our primary filter.
QAre you using any of the Palo Alto Network data feeds,
such as the URL, IDS or malware feeds?
AWe are using Wildfire for malware. We’re also using their
BrightCloud service for the web content filtering. The good
thing with that is our existing third party content filtering
service was using BrightCloud as their back-end category
database.
That was almost a one-to-one migration and it was a very
simple migration for us. Wildfire services are relatively new
to us. Just last month, we purchased the license to use the
full WildFire service to inspect and detonate any attachments
that we receive or that are downloaded through services such
as Dropbox. We automatically forward those to WildFire for
inspection and detonation. We’ve seen immediate results from
that service. I think within the first week of turning it on, we
found a few items that probably would have slipped through
the door undetected and possibly propagated. Our existing
anti-virus controls didn’t detect anything malicious. Through
WildFire, they were identified as malicious. After performing
a deeper inspection, we determined they actually were. So,
we’ve had some success with WildFire right out of the gate.
SANS WhatWorks
QSince you’ve been using the four Palo Alto Networks
boxes, is managing the firewalls a fulltime/part time job?
Do you have an idea of how much effort it takes you in
the steady state?
A
I would say no more time than what we used on our prior
solution. I spend maybe two hours a day performing health
checks and looking to see what type of activity is detected via
Palo Alto Networks. We have another analyst that handles
more of the web filter management when we have to create
exceptions, or make any filter adjustments. So, again, if
someone’s doing a rip and replace from a port and protocol
firewall over to Palo Alto Networks application firewall, I could
honestly say there’s not an increase in administration that
needs to be done.
QHow long has it been since you switched over, or turned
on the Palo Alto Networks firewalls?
A
We’ve been running a little over a full year.
QAre there any lessons learned that you’d like to pass on,
or things knowing what you know now that you would
have done differently?
A
S ome of the lessons learned are more around the web
content filtering. It is kind of a double-edged sword. Palo Alto
Networks is very granular in its capabilities – and, again, that’s
where it becomes a double-edged sword. Let’s say on our
past web filter solution, if an end user put in a request to go to
a website and that website just happened to have a video clip
on it, and it had an audio stream, as long as we allowed that
individual to go to that URL, they would have access to every
component within that site. So, if it was streaming media, it
would just work for them. When we switched over to Palo
Alto Networks, it breaks apart the individual applications and
web components that make up a webpage – so, even if we
say, “Okay, they’re allowed to go to sony.com,” for example – if
there are embedded YouTube videos and such within that
page, they won’t have access to the video content. So, we
find ourselves having to break down pages a little bit more
to understand what access we’re granting. From a security
standpoint, it’s great, and from a system performance it’s great.
(We’re a widely distributed network and we have some slow
bandwidth going out to some of our branches. We don’t
want branch users watching YouTube videos and such.) But,
on the flip side, from a management standpoint, our Analyst
maintaining our web filter or web content rules, is finding
himself having to inspect and trouble-shoot web pages a
little bit more, or grant access to sub components and sub
applications to individuals, or to groups.
Using Palo Alto Networks Next Generation Firewalls to Increase Visibility into Threats and Reduce Threat Risks
QHave you used their tech support?
How would you rate
Palo Alto Networks’ tech support?
A
Yes. I’ve used it. During our implementation, we ran into
what we thought was a snag from a technical standpoint, but it
turned out to be human error on our part. The technician we
called pinpointed it within seconds. He knew the architecture
inside and out. Since then, I think I’ve opened four support
cases. And those typically had some odd scenario or odd
rule unique to us. We wanted to validate how we would
accomplish what we needed to do and make sure we did it
right, bringing Palo Alto Networks in to vet the work and say,
“did we do this right?” or “do you recommend we do this a
different way?” They’ve been very helpful with that.
QSince you’ve been using them for a year--any
requirements, or new features you’ve told them you’d
like to see them in?
A
Yes, I’ve expressed some interest in the area of reporting.
There are a lot of canned reports that one can generate. I’m
hoping to get some of the report formats customized so that
they can be presented to a higher-level audience. There are
decent reports for letting us know from a network and from
a security standpoint of what’s going on, but, I often have to
take that same data and massage it to make it “CIO friendly”.
The data is there, it’s just that the report templates don’t really
have the data organized in a format that our CIO or anybody
can understand. That’s a feature request that I’ve put in, but
typically every time I upgrade there’s a new feature that comes
I could honestly say I haven’t really had anything break, or go
out. At this point I haven’t
haywire to where we had
really had to put in too many
to call them and say, “Come
During
our
implementation,
we
ran
into
what
we
requests. DNS sinkholing is
bail us out,” or “Help, we
a new feature that recently
don’t know what to do.”
thought was a snag from a technical standpoint, but came out, and I implemented
Even the upgrades we
within a week of it coming out
it turned out to be human error on our part. The
implemented from one of
in the new code version. It’s
the lower code versions
technician we called pinpointed it within seconds. He a wonderful feature to help
to the latest and greatest
us try to detect botnet traffic
version of code. (There
knew the architecture inside and out.
and spyware, malware in our
were like two or three
environment.
significant jumps in between
versions). From a paranoia standpoint - just from working with
our prior environment, we knew that we would be on a call
with support for probably hours, and there would be significant
down time trying to jump that many levels in an upgrade;
and then when we’re done, cross our fingers and see what
broke and hope for the best. For the upgrade on Palo Alto
Networks, we had support on standby in case we did have an
issue, and it was basically two clicks of a mouse button and the
system was upgraded. So, even that was a non-event.
QAnything else that you’d like to bring up that I didn’t ask
about?
A
No. I can’t say this about every vendor that we deal with,
but it’s been a very pleasant experience and I’m hoping Palo
Alto Networks keeps developing their products and staying
ahead of the curve. If they do that, I’m sure we’ll have a long
relationship with them.
QThe performance, throughput:
have they met their
claims and are you happy with the performance ratings?
A
Yes. We’re not the largest shop. As for our firewall rules
and net rules – we’re talking about hundreds of rules,
not thousands, or tens of thousands, like some larger
organizations. When I look at our CPU performance and our
throughput, we’re not even breaking a sweat. We’re running
at five percent CPU utilization on the data plane, and the
management plane has almost no notable performance.
SANS WhatWorks
Using Palo Alto Networks Next Generation Firewalls to Increase Visibility into Threats and Reduce Threat Risks
SANS Bottom Line on Palo Alto Next Generation Firewall at Northwest:
•Next Generation Firewalls provide both visibility into application layer traffic and the ability to enforce application level
polcies vs. port/protocol-centric policies.
•Switching firewall platforms does require translation of existing policy bases. Northwest took multiple steps to ease that
transition, initially installing the Next Generation Firewall in front of the legacy firewall to passively observe how new
policies would impact business traffic.
•The Palo Alto Networks Next Generation Firewall enabled inspection of SSL traffic as well as more granular enforcement
of web site access policies. This increased granularity does increase complexity – administrators should attend training
courses.
•Product performance and vendor support met all promises and expectations. Northwest is looking at expanding its use of
the product’s capabilities.
SANS WhatWorks
Using Palo Alto Networks Next Generation Firewalls to Increase Visibility into Threats and Reduce Threat Risks
Download